Load algorithm parameters from PEM encoded 'EC PRIVATE KEY' files
Update `PrivateKeyParser` implementations so that algorithm parameters for PEM encoded 'EC PRIVATE KEY' files are loaded from the incoming data. Prior to this commit, the algorithm parameter was hard-coded to 'secp384r1' which could result in a mismatch to the actual file content. Fixes gh-34232
This commit is contained in:
parent
80cb21e800
commit
fd8cb74b46
|
@ -18,6 +18,7 @@ package org.springframework.boot.buildpack.platform.docker.ssl;
|
||||||
|
|
||||||
import java.io.ByteArrayOutputStream;
|
import java.io.ByteArrayOutputStream;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
import java.nio.ByteBuffer;
|
||||||
import java.nio.charset.StandardCharsets;
|
import java.nio.charset.StandardCharsets;
|
||||||
import java.nio.file.Files;
|
import java.nio.file.Files;
|
||||||
import java.nio.file.Path;
|
import java.nio.file.Path;
|
||||||
|
@ -33,6 +34,9 @@ import java.util.function.Function;
|
||||||
import java.util.regex.Matcher;
|
import java.util.regex.Matcher;
|
||||||
import java.util.regex.Pattern;
|
import java.util.regex.Pattern;
|
||||||
|
|
||||||
|
import org.springframework.boot.buildpack.platform.docker.ssl.PrivateKeyParser.DerElement.TagType;
|
||||||
|
import org.springframework.boot.buildpack.platform.docker.ssl.PrivateKeyParser.DerElement.ValueType;
|
||||||
|
import org.springframework.util.Assert;
|
||||||
import org.springframework.util.Base64Utils;
|
import org.springframework.util.Base64Utils;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -90,7 +94,38 @@ final class PrivateKeyParser {
|
||||||
}
|
}
|
||||||
|
|
||||||
private static PKCS8EncodedKeySpec createKeySpecForEc(byte[] bytes) {
|
private static PKCS8EncodedKeySpec createKeySpecForEc(byte[] bytes) {
|
||||||
return createKeySpecForAlgorithm(bytes, EC_ALGORITHM, EC_PARAMETERS);
|
DerElement ecPrivateKey = DerElement.of(bytes);
|
||||||
|
Assert.state(ecPrivateKey.isType(ValueType.ENCODED, TagType.SEQUENCE),
|
||||||
|
"Key spec should be an ASN.1 encoded sequence");
|
||||||
|
DerElement version = DerElement.of(ecPrivateKey.getContents());
|
||||||
|
Assert.state(version != null && version.isType(ValueType.PRIMITIVE, TagType.INTEGER),
|
||||||
|
"Key spec should start with version");
|
||||||
|
Assert.state(version.getContents().remaining() == 1 && version.getContents().get() == 1,
|
||||||
|
"Key spec version must be 1");
|
||||||
|
DerElement privateKey = DerElement.of(ecPrivateKey.getContents());
|
||||||
|
Assert.state(privateKey != null && privateKey.isType(ValueType.PRIMITIVE, TagType.OCTET_STRING),
|
||||||
|
"Key spec should contain private key");
|
||||||
|
DerElement parameters = DerElement.of(ecPrivateKey.getContents());
|
||||||
|
return createKeySpecForAlgorithm(bytes, EC_ALGORITHM, getEcParameters(parameters));
|
||||||
|
}
|
||||||
|
|
||||||
|
private static int[] getEcParameters(DerElement parameters) {
|
||||||
|
if (parameters == null) {
|
||||||
|
return EC_PARAMETERS;
|
||||||
|
}
|
||||||
|
Assert.state(parameters.isType(ValueType.ENCODED), "Key spec should contain encoded parameters");
|
||||||
|
DerElement contents = DerElement.of(parameters.getContents());
|
||||||
|
Assert.state(contents.isType(ValueType.PRIMITIVE, TagType.OBJECT_IDENTIFIER),
|
||||||
|
"Key spec parameters should contain object identifier");
|
||||||
|
return getEcParameters(contents.getContents());
|
||||||
|
}
|
||||||
|
|
||||||
|
private static int[] getEcParameters(ByteBuffer bytes) {
|
||||||
|
int[] result = new int[bytes.remaining()];
|
||||||
|
for (int i = 0; i < result.length; i++) {
|
||||||
|
result[i] = bytes.get() & 0xFF;
|
||||||
|
}
|
||||||
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
private static PKCS8EncodedKeySpec createKeySpecForAlgorithm(byte[] bytes, int[] algorithm, int[] parameters) {
|
private static PKCS8EncodedKeySpec createKeySpecForAlgorithm(byte[] bytes, int[] algorithm, int[] parameters) {
|
||||||
|
@ -258,4 +293,102 @@ final class PrivateKeyParser {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* An ASN.1 DER encoded element.
|
||||||
|
*/
|
||||||
|
static final class DerElement {
|
||||||
|
|
||||||
|
private final ValueType valueType;
|
||||||
|
|
||||||
|
private final long tagType;
|
||||||
|
|
||||||
|
private ByteBuffer contents;
|
||||||
|
|
||||||
|
private DerElement(ByteBuffer bytes) {
|
||||||
|
byte b = bytes.get();
|
||||||
|
this.valueType = ((b & 0x20) == 0) ? ValueType.PRIMITIVE : ValueType.ENCODED;
|
||||||
|
this.tagType = decodeTagType(b, bytes);
|
||||||
|
int length = decodeLength(bytes);
|
||||||
|
bytes.limit(bytes.position() + length);
|
||||||
|
this.contents = bytes.slice();
|
||||||
|
bytes.limit(bytes.capacity());
|
||||||
|
bytes.position(bytes.position() + length);
|
||||||
|
}
|
||||||
|
|
||||||
|
private long decodeTagType(byte b, ByteBuffer bytes) {
|
||||||
|
long tagType = (b & 0x1F);
|
||||||
|
if (tagType != 0x1F) {
|
||||||
|
return tagType;
|
||||||
|
}
|
||||||
|
tagType = 0;
|
||||||
|
b = bytes.get();
|
||||||
|
while ((b & 0x80) != 0) {
|
||||||
|
tagType <<= 7;
|
||||||
|
tagType = tagType | (b & 0x7F);
|
||||||
|
b = bytes.get();
|
||||||
|
}
|
||||||
|
return tagType;
|
||||||
|
}
|
||||||
|
|
||||||
|
private int decodeLength(ByteBuffer bytes) {
|
||||||
|
byte b = bytes.get();
|
||||||
|
if ((b & 0x80) == 0) {
|
||||||
|
return b & 0x7F;
|
||||||
|
}
|
||||||
|
int numberOfLengthBytes = (b & 0x7F);
|
||||||
|
Assert.state(numberOfLengthBytes != 0, "Infinite length encoding is not supported");
|
||||||
|
Assert.state(numberOfLengthBytes != 0x7F, "Reserved length encoding is not supported");
|
||||||
|
Assert.state(numberOfLengthBytes <= 4, "Length overflow");
|
||||||
|
int length = 0;
|
||||||
|
for (int i = 0; i < numberOfLengthBytes; i++) {
|
||||||
|
length <<= 8;
|
||||||
|
length |= (bytes.get() & 0xFF);
|
||||||
|
}
|
||||||
|
return length;
|
||||||
|
}
|
||||||
|
|
||||||
|
boolean isType(ValueType valueType) {
|
||||||
|
return this.valueType == valueType;
|
||||||
|
}
|
||||||
|
|
||||||
|
boolean isType(ValueType valueType, TagType tagType) {
|
||||||
|
return this.valueType == valueType && this.tagType == tagType.getNumber();
|
||||||
|
}
|
||||||
|
|
||||||
|
ByteBuffer getContents() {
|
||||||
|
return this.contents;
|
||||||
|
}
|
||||||
|
|
||||||
|
static DerElement of(byte[] bytes) {
|
||||||
|
return of(ByteBuffer.wrap(bytes));
|
||||||
|
}
|
||||||
|
|
||||||
|
static DerElement of(ByteBuffer bytes) {
|
||||||
|
return (bytes.remaining() > 0) ? new DerElement(bytes) : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
enum ValueType {
|
||||||
|
|
||||||
|
PRIMITIVE, ENCODED
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
enum TagType {
|
||||||
|
|
||||||
|
INTEGER(0x02), OCTET_STRING(0x04), OBJECT_IDENTIFIER(0x06), SEQUENCE(0x10);
|
||||||
|
|
||||||
|
private final int number;
|
||||||
|
|
||||||
|
TagType(int number) {
|
||||||
|
this.number = number;
|
||||||
|
}
|
||||||
|
|
||||||
|
int getNumber() {
|
||||||
|
return this.number;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -82,7 +82,13 @@ public class PemFileWriter {
|
||||||
+ "wSKcVTdEdO2DhBlYddN0zG0rjq4vDMtdmldEl4BdldQ=\n" + "-----END RSA PRIVATE KEY-----\n";
|
+ "wSKcVTdEdO2DhBlYddN0zG0rjq4vDMtdmldEl4BdldQ=\n" + "-----END RSA PRIVATE KEY-----\n";
|
||||||
|
|
||||||
public static final String PRIVATE_EC_KEY = EXAMPLE_SECRET_QUALIFIER + "-----BEGIN EC PRIVATE KEY-----\n"
|
public static final String PRIVATE_EC_KEY = EXAMPLE_SECRET_QUALIFIER + "-----BEGIN EC PRIVATE KEY-----\n"
|
||||||
+ "MHcCAQEEIIwZkO8Zjbggzi8wwrk5rzSPzUX31gqTRhBYw4AL6w44oAoGCCqGSM49\n"
|
+ "MIGkAgEBBDB21WGGOb1DokKW0MUHO7RQ6jZSUYXfO2iyfCbjmSJhyK8fSuq1V0N2\n"
|
||||||
|
+ "Bj7X+XYhS6ygBwYFK4EEACKhZANiAATsRaYri/tDMvrrB2NJlxWFOZ4YBLYdSM+a\n"
|
||||||
|
+ "FlGh1FuLjOHW9cx8w0iRHd1Hxn4sxqsa62KzGoCj63lGoaJgi67YNCF0lBa/zCLy\n"
|
||||||
|
+ "ktaMsQePDOR8UR0Cfi2J9bh+IjxXd+o=\n" + "-----END EC PRIVATE KEY-----";
|
||||||
|
|
||||||
|
public static final String PRIVATE_EC_KEY_PRIME_256_V1 = EXAMPLE_SECRET_QUALIFIER
|
||||||
|
+ "-----BEGIN EC PRIVATE KEY-----\n" + "MHcCAQEEIIwZkO8Zjbggzi8wwrk5rzSPzUX31gqTRhBYw4AL6w44oAoGCCqGSM49\n"
|
||||||
+ "AwEHoUQDQgAE8y28khug747bA68M90IAMCPHAYyen+RsN6i84LORpNDUhv00QZWd\n"
|
+ "AwEHoUQDQgAE8y28khug747bA68M90IAMCPHAYyen+RsN6i84LORpNDUhv00QZWd\n"
|
||||||
+ "hOhjWFCQjnewR98Y8pEb1fnORll4LhHPlQ==\n" + "-----END EC PRIVATE KEY-----";
|
+ "hOhjWFCQjnewR98Y8pEb1fnORll4LhHPlQ==\n" + "-----END EC PRIVATE KEY-----";
|
||||||
|
|
||||||
|
|
|
@ -22,6 +22,7 @@ import java.net.URISyntaxException;
|
||||||
import java.nio.file.Path;
|
import java.nio.file.Path;
|
||||||
import java.nio.file.Paths;
|
import java.nio.file.Paths;
|
||||||
import java.security.PrivateKey;
|
import java.security.PrivateKey;
|
||||||
|
import java.security.interfaces.ECPrivateKey;
|
||||||
|
|
||||||
import org.junit.jupiter.api.AfterEach;
|
import org.junit.jupiter.api.AfterEach;
|
||||||
import org.junit.jupiter.api.BeforeEach;
|
import org.junit.jupiter.api.BeforeEach;
|
||||||
|
@ -89,17 +90,27 @@ class PrivateKeyParserTests {
|
||||||
Path path = this.fileWriter.writeFile("key.pem", PemFileWriter.PRIVATE_RSA_KEY);
|
Path path = this.fileWriter.writeFile("key.pem", PemFileWriter.PRIVATE_RSA_KEY);
|
||||||
PrivateKey privateKey = PrivateKeyParser.parse(path);
|
PrivateKey privateKey = PrivateKeyParser.parse(path);
|
||||||
assertThat(privateKey).isNotNull();
|
assertThat(privateKey).isNotNull();
|
||||||
// keys in PKCS#1 format are converted to PKCS#8 for parsing
|
|
||||||
assertThat(privateKey.getFormat()).isEqualTo("PKCS#8");
|
assertThat(privateKey.getFormat()).isEqualTo("PKCS#8");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
void parsePkcs1EcKeyFile() throws IOException {
|
void parsePemEcKeyFile() throws IOException {
|
||||||
Path path = this.fileWriter.writeFile("key.pem", PemFileWriter.PRIVATE_EC_KEY);
|
Path path = this.fileWriter.writeFile("key.pem", PemFileWriter.PRIVATE_EC_KEY);
|
||||||
PrivateKey privateKey = PrivateKeyParser.parse(path);
|
ECPrivateKey privateKey = (ECPrivateKey) PrivateKeyParser.parse(path);
|
||||||
assertThat(privateKey).isNotNull();
|
assertThat(privateKey).isNotNull();
|
||||||
// keys in PKCS#1 format are converted to PKCS#8 for parsing
|
|
||||||
assertThat(privateKey.getFormat()).isEqualTo("PKCS#8");
|
assertThat(privateKey.getFormat()).isEqualTo("PKCS#8");
|
||||||
|
assertThat(privateKey.getAlgorithm()).isEqualTo("EC");
|
||||||
|
assertThat(privateKey.getParams().toString()).contains("1.3.132.0.34").doesNotContain("prime256v1");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void parsePemEcKeyFilePrime256v1() throws IOException {
|
||||||
|
Path path = this.fileWriter.writeFile("key.pem", PemFileWriter.PRIVATE_EC_KEY_PRIME_256_V1);
|
||||||
|
ECPrivateKey privateKey = (ECPrivateKey) PrivateKeyParser.parse(path);
|
||||||
|
assertThat(privateKey).isNotNull();
|
||||||
|
assertThat(privateKey.getFormat()).isEqualTo("PKCS#8");
|
||||||
|
assertThat(privateKey.getAlgorithm()).isEqualTo("EC");
|
||||||
|
assertThat(privateKey.getParams().toString()).contains("prime256v1").doesNotContain("1.3.132.0.34");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -21,6 +21,7 @@ import java.io.IOException;
|
||||||
import java.io.InputStreamReader;
|
import java.io.InputStreamReader;
|
||||||
import java.io.Reader;
|
import java.io.Reader;
|
||||||
import java.net.URL;
|
import java.net.URL;
|
||||||
|
import java.nio.ByteBuffer;
|
||||||
import java.security.GeneralSecurityException;
|
import java.security.GeneralSecurityException;
|
||||||
import java.security.KeyFactory;
|
import java.security.KeyFactory;
|
||||||
import java.security.PrivateKey;
|
import java.security.PrivateKey;
|
||||||
|
@ -33,6 +34,9 @@ import java.util.function.Function;
|
||||||
import java.util.regex.Matcher;
|
import java.util.regex.Matcher;
|
||||||
import java.util.regex.Pattern;
|
import java.util.regex.Pattern;
|
||||||
|
|
||||||
|
import org.springframework.boot.web.server.PrivateKeyParser.DerElement.TagType;
|
||||||
|
import org.springframework.boot.web.server.PrivateKeyParser.DerElement.ValueType;
|
||||||
|
import org.springframework.util.Assert;
|
||||||
import org.springframework.util.Base64Utils;
|
import org.springframework.util.Base64Utils;
|
||||||
import org.springframework.util.FileCopyUtils;
|
import org.springframework.util.FileCopyUtils;
|
||||||
import org.springframework.util.ResourceUtils;
|
import org.springframework.util.ResourceUtils;
|
||||||
|
@ -92,7 +96,38 @@ final class PrivateKeyParser {
|
||||||
}
|
}
|
||||||
|
|
||||||
private static PKCS8EncodedKeySpec createKeySpecForEc(byte[] bytes) {
|
private static PKCS8EncodedKeySpec createKeySpecForEc(byte[] bytes) {
|
||||||
return createKeySpecForAlgorithm(bytes, EC_ALGORITHM, EC_PARAMETERS);
|
DerElement ecPrivateKey = DerElement.of(bytes);
|
||||||
|
Assert.state(ecPrivateKey.isType(ValueType.ENCODED, TagType.SEQUENCE),
|
||||||
|
"Key spec should be an ASN.1 encoded sequence");
|
||||||
|
DerElement version = DerElement.of(ecPrivateKey.getContents());
|
||||||
|
Assert.state(version != null && version.isType(ValueType.PRIMITIVE, TagType.INTEGER),
|
||||||
|
"Key spec should start with version");
|
||||||
|
Assert.state(version.getContents().remaining() == 1 && version.getContents().get() == 1,
|
||||||
|
"Key spec version must be 1");
|
||||||
|
DerElement privateKey = DerElement.of(ecPrivateKey.getContents());
|
||||||
|
Assert.state(privateKey != null && privateKey.isType(ValueType.PRIMITIVE, TagType.OCTET_STRING),
|
||||||
|
"Key spec should contain private key");
|
||||||
|
DerElement parameters = DerElement.of(ecPrivateKey.getContents());
|
||||||
|
return createKeySpecForAlgorithm(bytes, EC_ALGORITHM, getEcParameters(parameters));
|
||||||
|
}
|
||||||
|
|
||||||
|
private static int[] getEcParameters(DerElement parameters) {
|
||||||
|
if (parameters == null) {
|
||||||
|
return EC_PARAMETERS;
|
||||||
|
}
|
||||||
|
Assert.state(parameters.isType(ValueType.ENCODED), "Key spec should contain encoded parameters");
|
||||||
|
DerElement contents = DerElement.of(parameters.getContents());
|
||||||
|
Assert.state(contents.isType(ValueType.PRIMITIVE, TagType.OBJECT_IDENTIFIER),
|
||||||
|
"Key spec parameters should contain object identifier");
|
||||||
|
return getEcParameters(contents.getContents());
|
||||||
|
}
|
||||||
|
|
||||||
|
private static int[] getEcParameters(ByteBuffer bytes) {
|
||||||
|
int[] result = new int[bytes.remaining()];
|
||||||
|
for (int i = 0; i < result.length; i++) {
|
||||||
|
result[i] = bytes.get() & 0xFF;
|
||||||
|
}
|
||||||
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
private static PKCS8EncodedKeySpec createKeySpecForAlgorithm(byte[] bytes, int[] algorithm, int[] parameters) {
|
private static PKCS8EncodedKeySpec createKeySpecForAlgorithm(byte[] bytes, int[] algorithm, int[] parameters) {
|
||||||
|
@ -102,8 +137,7 @@ final class PrivateKeyParser {
|
||||||
DerEncoder algorithmIdentifier = new DerEncoder();
|
DerEncoder algorithmIdentifier = new DerEncoder();
|
||||||
algorithmIdentifier.objectIdentifier(algorithm);
|
algorithmIdentifier.objectIdentifier(algorithm);
|
||||||
algorithmIdentifier.objectIdentifier(parameters);
|
algorithmIdentifier.objectIdentifier(parameters);
|
||||||
byte[] byteArray = algorithmIdentifier.toByteArray();
|
encoder.sequence(algorithmIdentifier.toByteArray());
|
||||||
encoder.sequence(byteArray);
|
|
||||||
encoder.octetString(bytes);
|
encoder.octetString(bytes);
|
||||||
return new PKCS8EncodedKeySpec(encoder.toSequence());
|
return new PKCS8EncodedKeySpec(encoder.toSequence());
|
||||||
}
|
}
|
||||||
|
@ -262,4 +296,102 @@ final class PrivateKeyParser {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* An ASN.1 DER encoded element.
|
||||||
|
*/
|
||||||
|
static final class DerElement {
|
||||||
|
|
||||||
|
private final ValueType valueType;
|
||||||
|
|
||||||
|
private final long tagType;
|
||||||
|
|
||||||
|
private ByteBuffer contents;
|
||||||
|
|
||||||
|
private DerElement(ByteBuffer bytes) {
|
||||||
|
byte b = bytes.get();
|
||||||
|
this.valueType = ((b & 0x20) == 0) ? ValueType.PRIMITIVE : ValueType.ENCODED;
|
||||||
|
this.tagType = decodeTagType(b, bytes);
|
||||||
|
int length = decodeLength(bytes);
|
||||||
|
bytes.limit(bytes.position() + length);
|
||||||
|
this.contents = bytes.slice();
|
||||||
|
bytes.limit(bytes.capacity());
|
||||||
|
bytes.position(bytes.position() + length);
|
||||||
|
}
|
||||||
|
|
||||||
|
private long decodeTagType(byte b, ByteBuffer bytes) {
|
||||||
|
long tagType = (b & 0x1F);
|
||||||
|
if (tagType != 0x1F) {
|
||||||
|
return tagType;
|
||||||
|
}
|
||||||
|
tagType = 0;
|
||||||
|
b = bytes.get();
|
||||||
|
while ((b & 0x80) != 0) {
|
||||||
|
tagType <<= 7;
|
||||||
|
tagType = tagType | (b & 0x7F);
|
||||||
|
b = bytes.get();
|
||||||
|
}
|
||||||
|
return tagType;
|
||||||
|
}
|
||||||
|
|
||||||
|
private int decodeLength(ByteBuffer bytes) {
|
||||||
|
byte b = bytes.get();
|
||||||
|
if ((b & 0x80) == 0) {
|
||||||
|
return b & 0x7F;
|
||||||
|
}
|
||||||
|
int numberOfLengthBytes = (b & 0x7F);
|
||||||
|
Assert.state(numberOfLengthBytes != 0, "Infinite length encoding is not supported");
|
||||||
|
Assert.state(numberOfLengthBytes != 0x7F, "Reserved length encoding is not supported");
|
||||||
|
Assert.state(numberOfLengthBytes <= 4, "Length overflow");
|
||||||
|
int length = 0;
|
||||||
|
for (int i = 0; i < numberOfLengthBytes; i++) {
|
||||||
|
length <<= 8;
|
||||||
|
length |= (bytes.get() & 0xFF);
|
||||||
|
}
|
||||||
|
return length;
|
||||||
|
}
|
||||||
|
|
||||||
|
boolean isType(ValueType valueType) {
|
||||||
|
return this.valueType == valueType;
|
||||||
|
}
|
||||||
|
|
||||||
|
boolean isType(ValueType valueType, TagType tagType) {
|
||||||
|
return this.valueType == valueType && this.tagType == tagType.getNumber();
|
||||||
|
}
|
||||||
|
|
||||||
|
ByteBuffer getContents() {
|
||||||
|
return this.contents;
|
||||||
|
}
|
||||||
|
|
||||||
|
static DerElement of(byte[] bytes) {
|
||||||
|
return of(ByteBuffer.wrap(bytes));
|
||||||
|
}
|
||||||
|
|
||||||
|
static DerElement of(ByteBuffer bytes) {
|
||||||
|
return (bytes.remaining() > 0) ? new DerElement(bytes) : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
enum ValueType {
|
||||||
|
|
||||||
|
PRIMITIVE, ENCODED
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
enum TagType {
|
||||||
|
|
||||||
|
INTEGER(0x02), OCTET_STRING(0x04), OBJECT_IDENTIFIER(0x06), SEQUENCE(0x10);
|
||||||
|
|
||||||
|
private final int number;
|
||||||
|
|
||||||
|
TagType(int number) {
|
||||||
|
this.number = number;
|
||||||
|
}
|
||||||
|
|
||||||
|
int getNumber() {
|
||||||
|
return this.number;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -17,6 +17,7 @@
|
||||||
package org.springframework.boot.web.server;
|
package org.springframework.boot.web.server;
|
||||||
|
|
||||||
import java.security.PrivateKey;
|
import java.security.PrivateKey;
|
||||||
|
import java.security.interfaces.ECPrivateKey;
|
||||||
|
|
||||||
import org.junit.jupiter.api.Test;
|
import org.junit.jupiter.api.Test;
|
||||||
import org.junit.jupiter.params.ParameterizedTest;
|
import org.junit.jupiter.params.ParameterizedTest;
|
||||||
|
@ -30,6 +31,7 @@ import static org.assertj.core.api.Assertions.assertThatIllegalStateException;
|
||||||
*
|
*
|
||||||
* @author Scott Frederick
|
* @author Scott Frederick
|
||||||
* @author Moritz Halbritter
|
* @author Moritz Halbritter
|
||||||
|
* @author Phillip Webb
|
||||||
*/
|
*/
|
||||||
class PrivateKeyParserTests {
|
class PrivateKeyParserTests {
|
||||||
|
|
||||||
|
@ -60,11 +62,21 @@ class PrivateKeyParserTests {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
void parsePkcs8KeyFileWithEcdsa() {
|
void parsePemKeyFileWithEcdsa() {
|
||||||
PrivateKey privateKey = PrivateKeyParser.parse("classpath:test-ec-key.pem");
|
ECPrivateKey privateKey = (ECPrivateKey) PrivateKeyParser.parse("classpath:test-ec-key.pem");
|
||||||
assertThat(privateKey).isNotNull();
|
assertThat(privateKey).isNotNull();
|
||||||
assertThat(privateKey.getFormat()).isEqualTo("PKCS#8");
|
assertThat(privateKey.getFormat()).isEqualTo("PKCS#8");
|
||||||
assertThat(privateKey.getAlgorithm()).isEqualTo("EC");
|
assertThat(privateKey.getAlgorithm()).isEqualTo("EC");
|
||||||
|
assertThat(privateKey.getParams().toString()).contains("1.3.132.0.34").doesNotContain("prime256v1");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void parsePemKeyFileWithEcdsaPrime256v1() {
|
||||||
|
ECPrivateKey privateKey = (ECPrivateKey) PrivateKeyParser.parse("classpath:test-ec-key-prime256v1.pem");
|
||||||
|
assertThat(privateKey).isNotNull();
|
||||||
|
assertThat(privateKey.getFormat()).isEqualTo("PKCS#8");
|
||||||
|
assertThat(privateKey.getAlgorithm()).isEqualTo("EC");
|
||||||
|
assertThat(privateKey.getParams().toString()).contains("prime256v1").doesNotContain("1.3.132.0.34");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEINa5DtcVrTiC4pMDX+rnMbhIlxm26Rn5FYz2+uT5DmBcoAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAEj0M8x6W5fF5y5tdHvFCp0ws8gCOcETQk52uXSL46G3Uukng6lscf
|
||||||
|
yNobOV+NjmBCqJRZd0bKEvbIiMvpo6B0Fw==
|
||||||
|
-----END EC PRIVATE KEY-----
|
|
@ -1,5 +1,6 @@
|
||||||
-----BEGIN EC PRIVATE KEY-----
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
MHcCAQEEIBEZhSR+d8kwL5L/K0f/eNBm4RfzyyA1jfg+dV1/8WvqoAoGCCqGSM49
|
MIGkAgEBBDB21WGGOb1DokKW0MUHO7RQ6jZSUYXfO2iyfCbjmSJhyK8fSuq1V0N2
|
||||||
AwEHoUQDQgAEBbfdBTSUWuui7O2R+W9mDPjAHjgdBJsjrjnvkjnq8f/k4U/OqvjK
|
Bj7X+XYhS6ygBwYFK4EEACKhZANiAATsRaYri/tDMvrrB2NJlxWFOZ4YBLYdSM+a
|
||||||
qnHEZwYgdaF2WqYdqBYMns0n+tSMgBoonQ==
|
FlGh1FuLjOHW9cx8w0iRHd1Hxn4sxqsa62KzGoCj63lGoaJgi67YNCF0lBa/zCLy
|
||||||
|
ktaMsQePDOR8UR0Cfi2J9bh+IjxXd+o=
|
||||||
-----END EC PRIVATE KEY-----
|
-----END EC PRIVATE KEY-----
|
||||||
|
|
|
@ -93,6 +93,7 @@
|
||||||
</subpackage>
|
</subpackage>
|
||||||
<subpackage name="server">
|
<subpackage name="server">
|
||||||
<disallow pkg="org.springframework.context" />
|
<disallow pkg="org.springframework.context" />
|
||||||
|
<allow pkg="org.springframework.boot.web.server"/>
|
||||||
<subpackage name="context">
|
<subpackage name="context">
|
||||||
<allow pkg="org.springframework.context" />
|
<allow pkg="org.springframework.context" />
|
||||||
</subpackage>
|
</subpackage>
|
||||||
|
|
Loading…
Reference in New Issue